2014
DOI: 10.1080/00207160.2014.915316
|View full text |Cite
|
Sign up to set email alerts
|

DCapBAC: embedding authorization logic into smart things through ECC optimizations

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
66
0
2

Year Published

2016
2016
2022
2022

Publication Types

Select...
6
3

Relationship

0
9

Authors

Journals

citations
Cited by 110 publications
(68 citation statements)
references
References 23 publications
0
66
0
2
Order By: Relevance
“…Also all these systems (with the exception of some recent capability-based proposals e.g. [12]) tend to be heavily centralised, which is not an ideal model for an IoT-enabled smart healthcare system.…”
Section: Background and Problem Statementmentioning
confidence: 99%
See 1 more Smart Citation
“…Also all these systems (with the exception of some recent capability-based proposals e.g. [12]) tend to be heavily centralised, which is not an ideal model for an IoT-enabled smart healthcare system.…”
Section: Background and Problem Statementmentioning
confidence: 99%
“…CapBAC approaches (e.g. [8], [12]) can be used to provide finegrained access control and have been suggested for use in IoT systems due to the low requirements they place on things. A capability can be defined as a communicable, unforgeable token of authority [10].…”
Section: Background and Problem Statementmentioning
confidence: 99%
“…The DCapBAC FC is a delegated authorization mechanism [10] that flexibly allows a client device or application to access to a resource at a server device. This FC is distributed between the devices (i.e., the server and the client) and the SMARITE platform that provides authorization decisions.…”
Section: Functional Components For User-centric Privacymentioning
confidence: 99%
“…27 In order to establish the anonymity feature, the classical crypto-systems identity-based encryption (IBE) and ciphertext-policy attribute-based encryption (CP-ABE) are used. These systems apply public key-based mechanisms, which require very highperformance capabilities.…”
Section: Authentication and Access Controlmentioning
confidence: 99%